mthbernardes / QMKhuehuebrLinks
Trying to hack into keyboards
☆86Updated 6 years ago
Alternatives and similar repositories for QMKhuehuebr
Users that are interested in QMKhuehuebr are comparing it to the libraries listed below
Sorting:
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- A shellcode testing harness.☆70Updated last year
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Red Team Resources☆60Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- ☆102Updated 6 years ago
- ☆73Updated 6 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆65Updated 6 years ago
- API functions for Malware Research☆35Updated 6 years ago
- ☆100Updated 3 years ago
- ☆25Updated 3 weeks ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago